On Tue, May 11, 2004 at 08:10:30AM -0600, Stephen Smoogen wrote: > The standard way I have seen it implemented on other versions of Linux > (here and other large organizations) is that the central authentication > is used first in the pam stack and if it fails/isnt available you get > authorized against the local password db which if it works lets you in. "Other versions" including Red Hat Linux up until it suddenly stopped working circa version 7.3. <https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=55193> -- Matthew Miller mattdm@xxxxxxxxxx <http://www.mattdm.org/> Boston University Linux ------> <http://linux.bu.edu/>